200-201 Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS)

Which piece of information is needed for attribution in an investigation?

  • A . proxy logs showing the source RFC 1918 IP addresses
  • B . RDP allowed from the Internet
  • C . known threat actor behavior
  • D . 802.1x RADIUS authentication pass arid fail logs
Answer: Option C.

No answer description available for this question.

Leave a Reply

Your email address will not be published. Required fields are marked *

Back to top button
error: Alert: Content is protected !!

Adblock Detected

Please consider supporting us by disabling your ad blocker